What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
CISA adds two known exploited vulnerabilities to its catalog
CISA has added two new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2025-49113 RoundCube Webmail Deserialization Untrusted…
-
Vulnerability in Dell RecoverPoint for Virtual Machines could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-015ISSUE DATE(S):02/18/2026PREVIEW:A vulnerability has been discovered in Dell RecoverPoint for Virtual Machines that could allow arbitrary code execution. Dell RecoverPoint for Virtual Machines…
-
Multiple vulnerabilities in Ivanti Endpoint Manager Mobile could allow remote code execution
MS-ISAC NOTICE NUMBER:2026-009ISSUE DATE(S):01/30/2026PREVIEW:Several vulnerabilities have been discovered in Ivanti Endpoint Manager Mobile that could allow remote code execution. Ivanti Endpoint Manager Mobile is a…
-
A vulnerability in the WatchGuard Fireware operating system could allow arbitrary code execution.
MS-ISAC NOTICE NUMBER:2025-118ISSUE DATE(S):12/23/2025PREVIEW:A vulnerability has been discovered in WatchGuard Fireware OS that could allow unauthenticated arbitrary code execution. WatchGuard Fireware is the proprietary operating…













